Monday, January 16, 2012

Windows Firewall–Determining why you arent able to connect to a machine

Recently I was having trouble connecting to a Data Protection Manager server from a remote machine using power-shell cmdlets. I knew I had everything properly configured with DPM, and so I knew it was probably Windows Firewall that was blocking access to the computer.

What I needed was a log of what was being blocked and here is how I was able to turn on logging on the machine (a Windows 2008 server).

Under “Administrative Tools” select “Windows Firewall with Advanced Security”

image

Click on the topmost node: “Windows Firewall with Advanced Security on Local Computer”

image

Select “Windows Firewall Properties”

image

In my case I needed logging turned on for my Domain profile, so on the Domain profile tab, I clicked on the Customize button in the logging section and turn on logging of dropped packets:

image image

The log file is by default created at: “%systemroot%\system32\LogFiles\Firewall\pfirewall.log”

If you look at the log file you will find out the protocol that the remote machine is using to connect and the port. Depending on your specific situation you will have to add an incoming rule (or outgoing rule) to allow the appropriate connections through.

No comments:

Post a Comment

Remember, if you want me to respond to your comment, then you need to use a Google/OpenID account to leave the comment.